back to article Banking Trojans double as scareware runs wild

The prevalence of scareware packages has reached epidemic proportions, with 485,000 different samples detected in the first half of 2009 alone. The figure is more than five times the combined figure for the whole of 2008, according to statistics from the Anti-Phishing Working Group (APWG). The huge figures are explained by the …

COMMENTS

This topic is closed for new posts.
  1. Anonymous Coward
    Linux

    malvert infestation

    What's will all the 'malware' articles recently. And why can't I watch that 'On-demand Webcast' on Ubuntu?

  2. Mark Eaton-Park

    Simple to fix

    Don't accept email from servers that are not guaranteeing authenticity and are willing to accept damage costs in the event of spam relay.

    Everyone who knows how email works also knows how easy it is to spoof the sender field, even when they check against the senders IP it can be spoofed. However if all email has to be within the ISP domain and they are responsible for the content an abuser can have their account blocked. All free email services should limit new account post if they want to be able to provide a service.

    It would be fairly simple to set up via the existing domain registration system, simply a Y/N question if you accept liability for spam, if you don't then you will not have your email relayed.

    Problem solved

  3. Maty
    Headmaster

    Pedant alert

    'Payment services such as PayPal became the principle target of phishing attacks ..' The attacks were made on principle? Perhaps you meant 'principal'?

    But the spell-Czech said it was ok, huh?

This topic is closed for new posts.

Other stories you might like